Boletines de Vulnerabilidades |
Múltiples vulnerabilidades en gzip |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | gzip |
Descripción |
|
Se han descubierto múltiples vulnerabilidades en gzip. Las vulnerabilidades son descritas a continuación: - CVE-2006-4334: Denegación de servicio provocada al intentar acceder a los contenidos referenciados por un puntero nulo. - CVE-2006-4335: Desbordamiento de búfer podría permitir la ejecución de código arbitrario. - CVE-2006-4336: Desbordamiento de búfer podría permitir la ejecución de código arbitrario. - CVE-2006-4337: Desbordamiento de búfer en el soporte LZH podría permitir la ejecución de código arbitrario. - CVE-2006-4338: Denegación de servicio en gzip debido a un bucle infinito. |
|
Solución |
|
Actualización de software Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb AMD64 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb ARM http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb HP Precision http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb Mandriva Linux Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/gzip-1.2.4a-13.5.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gzip-1.2.4a-13.5.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/gzip-1.2.4a-13.5.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gzip-1.2.4a-13.5.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/gzip-1.2.4a-13.5.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/gzip-1.2.4a-13.5.M20mdk.src.rpm Mandriva Linux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/gzip-1.2.4a-15.3.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gzip-1.2.4a-15.3.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/gzip-1.2.4a-15.3.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gzip-1.2.4a-15.3.20060mdk.src.rpm Corporate Server 4.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/gzip-1.2.4a-15.3.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gzip-1.2.4a-15.3.20060mlcs4.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/gzip-1.2.4a-15.3.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gzip-1.2.4a-15.3.20060mlcs4.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Red Hat Linux (gzip) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ FreeBSD FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0, 6.1 http://security.freebsd.org/patches/SA-06:21/gzip.patch SGI Advanced Linux Environment 3 / RPM / Patch 10339 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10339 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS Hewlett-Packard HP Tru64 UNIX Version 5.1B-3 ERP Kit http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000947-V51BB26-ES-20061011 HP Tru64 UNIX Version 5.1B-2/PK4 ERP Kit http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000948-V51BB25-ES-20061011 HP Tru64 UNIX Version 5.1A PK6 ERP Kit http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000949-V51AB24-ES-20061011 HP Tru64 UNIX Version 4.0G PK4 ERP Kit http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000950-V40GB22-ES-20061011 HP Tru64 UNIX Version 4.0F PK8 ERP Kit http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT1000951-V40FB22-ES-20061011 Apple Security Update 2006-007 http://www.apple.com/support/downloads/securityupdate20060071039client.html http://www.apple.com/support/downloads/securityupdate20060071039server.html http://www.apple.com/support/downloads/securityupdate20060071048clientintel.html http://www.apple.com/support/downloads/securityupdate20060071048clientppc.html http://www.apple.com/support/downloads/securityupdate20060071048serverppc.html http://www.apple.com/support/downloads/securityupdate20060071048serveruniversal.html Sun(102766) Solaris 8 / SPARC / patch 112668-04 Solaris 8 / x86 / patch 112669-04 Solaris 9 / SPARC / patch 116340-06 Solaris 9 / x86 / patch 116341-06 Solaris 10 / SPARC / patch 120719-02 Solaris 10 / x86 / patch 120720-02 http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage Hewlett-Packard HP-UX B.11.11 / PHCO_35587 http://itrc.hp.com/ HP-UX B.11.23 / B.11.23.0612 http://docs.hp.com/en/SD |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338 |
BID | |
Recursos adicionales |
|
Debian Security Advisory DSA 1181-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00274.html Mandriva Security Advisory MDKSA-2006:167 http://www.mandriva.com/security/advisories?name=MDKSA-2006:167 SUSE Security Announcement SUSE-SA:2006:056 http://www.novell.com/linux/security/advisories/2006_56_gzip.html Red Hat Security Advisory RHSA-2006:0667-3 https://rhn.redhat.com/errata/RHSA-2006-0667.html FreeBSD Security Advisory (FreeBSD-SA-06:21.gzip) http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.asc SGI Security Advisory (20061001-01-P) ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc HP SECURITY BULLETIN (HPSBTU02168) http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c00797077 Apple Security Update 2006-007 (304829) http://docs.info.apple.com/article.html?artnum=304829 Sun Alert Notification (102766) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1 HP SECURITY BULLETIN (HPSBUX02195) http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c00874667 |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2006-09-29 |
1.1 | Aviso emitido por SUSE (SUSE-SA:2006:056) | 2006-10-03 |
1.2 | Aviso emitido por Red Hat (RHSA-2006:0667-3) | 2006-10-04 |
1.3 | Aviso emitido por FreeBSD (FreeBSD-SA-06:21.gzip) | 2006-10-06 |
1.4 | Aviso emitido por SGI (20061001-01-P) | 2006-10-23 |
1.5 | Aviso emitido por HP (HPSBTU02168) | 2006-10-30 |
1.6 | Aviso emitido por Apple (304829) | 2006-12-04 |
1.7 | Aviso emitido por Sun (102766) | 2007-01-09 |
1.8 | Aviso actualizado por Sun (102766) | 2007-01-18 |
1.9 | Aviso actualizado por Sun (102766) | 2007-02-22 |
1.10 | Aviso emitido por HP (HPSBUX02195) | 2007-03-02 |
1.11 | Aviso actualizado por Sun (102766) | 2007-03-08 |